Vulnerability Description
The 3DPrint WordPress plugin before 3.5.6.9 does not protect against CSRF attacks in the modified version of Tiny File Manager included with the plugin, allowing an attacker to craft a malicious request that will create an archive of any files or directories on the target server by tricking a logged in admin into submitting a form. Furthermore the created archive has a predictable location and name, allowing the attacker to download the file if they know the time at which the form was submitted, making it possible to leak sensitive files like the WordPress configuration containing database credentials and secrets.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| 3Dprint Project | 3Dprint | < 3.5.6.9 |
References
- https://jetpack.com/blog/vulnerabilities-found-in-the-3dprint-premium-plugin/Exploit
- https://wpscan.com/vulnerability/859c6e7e-2381-4d93-a526-2000b4fb8feeExploitThird Party Advisory
- https://jetpack.com/blog/vulnerabilities-found-in-the-3dprint-premium-plugin/Exploit
- https://wpscan.com/vulnerability/859c6e7e-2381-4d93-a526-2000b4fb8feeExploitThird Party Advisory
FAQ
What is CVE-2022-4023?
CVE-2022-4023 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The 3DPrint WordPress plugin before 3.5.6.9 does not protect against CSRF attacks in the modified version of Tiny File Manager included with the plugin, allowing an attacker to craft a malicious reque...
How severe is CVE-2022-4023?
CVE-2022-4023 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-4023?
Check the references section above for vendor advisories and patch information. Affected products include: 3Dprint Project 3Dprint.